{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:09:08Z","timestamp":1771700948576,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642123672","type":"print"},{"value":"9783642123689","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_7","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"90-105","source":"Crossref","is-referenced-by-count":7,"title":["Generic Constructions of Biometric Identity Based Encryption Systems"],"prefix":"10.1007","author":[{"given":"Neyire Deniz","family":"Sarier","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-642-00862-7_3","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"G. Ateniese","year":"2009","unstructured":"Ateniese, G., Gasti, P.: Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. In: Fischlin, M. (ed.) RSA Conference 2009. LNCS, vol.\u00a05473, pp. 32\u201347. Springer, Heidelberg (2009)"},{"key":"7_CR2","first-page":"368","volume-title":"ASIACCS\u201907","author":"J. Baek","year":"2007","unstructured":"Baek, J., Susilo, W., Zhou, J.: New constructions of fuzzy identity-based encryption. In: ASIACCS\u201907, pp. 368\u2013370. ACM, New York (2007)"},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s00145-007-9000-z","volume":"21","author":"K. Bentahar","year":"2008","unstructured":"Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic Constructions of Identity-Based and Certificateless KEMs. J. Cryptology\u00a021(2), 178\u2013199 (2008)","journal-title":"J. Cryptology"},{"issue":"3","key":"7_CR4","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.K.: Identity-Based Encryption from the Weil Pairing. SIAM J. Comput.\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"7_CR5","first-page":"647","volume-title":"FOCS\u201907","author":"D. Boneh","year":"2007","unstructured":"Boneh, D., Gentry, C., Hamburg, M.: Space-Efficient Identity Based Encryption Without Pairings. In: FOCS\u201907, pp. 647\u2013657. IEEE, Los Alamitos (2007)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11426639_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X. Boyen","year":"2005","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure Remote Authentication Using Biometric Data. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 147\u2013163. Springer, Heidelberg (2005)"},{"key":"7_CR7","first-page":"1","volume-title":"BTAS\u201907","author":"J. Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Cohen, G.D., Kindarji, B., Z\u00e9mor, G.: Optimal Iris Fuzzy Sketches. In: BTAS\u201907, pp. 1\u20136. IEEE, Los Alamitos (2007)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-73458-1_8","volume-title":"Information Security and Privacy","author":"J. Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Izabach\u00e8ne, M., Pointcheval, D., Tang, Q., Zimmer, S.: An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, pp. 96\u2013106. Springer, Heidelberg (2007)"},{"issue":"3","key":"7_CR9","first-page":"317","volume":"5","author":"A. Burnett","year":"2007","unstructured":"Burnett, A., Byrne, F., Dowling, T., Duffy, A.: A Biometric Identity Based Signature Scheme. International Journal of Network Security\u00a05(3), 317\u2013326 (2007)","journal-title":"International Journal of Network Security"},{"key":"7_CR10","first-page":"1","volume-title":"BTAS\u201907","author":"C. Chen","year":"2007","unstructured":"Chen, C., Veldhuis, R.N.J., Kevenaar, T.A.M., Akkermans, A.H.M.: Multi-bits biometric string generation based on the likelyhood ratio. In: BTAS\u201907, pp. 1\u20136. IEEE, Los Alamitos (2007)"},{"key":"7_CR11","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1145\/1060590.1060688","volume-title":"STOC\u201905","author":"Y. Dodis","year":"2005","unstructured":"Dodis, Y., Smith, A.: Correcting errors without leaking partial information. In: STOC\u201905, pp. 654\u2013663. ACM, New York (2005)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-89754-5_10","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"J. Furukawa","year":"2008","unstructured":"Furukawa, J., Attrapadung, N., Sakai, R., Hanaoka, G.: A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 116\u2013129. Springer, Heidelberg (2008)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/11780656_29","volume-title":"Information Security and Privacy","author":"T. Kitagawa","year":"2006","unstructured":"Kitagawa, T., Yang, P., Hanaoka, G., Zhang, R., Watanabe, H., Matsuura, K., Imai, H.: Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 348\u2013359. Springer, Heidelberg (2006)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/11935230_7","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"Q. Li","year":"2006","unstructured":"Li, Q., Sutcu, Y., Memon, N.D.: Secure Sketch for Biometric Templates. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 99\u2013113. Springer, Heidelberg (2006)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45353-9_13","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"T. Okamoto","year":"2001","unstructured":"Okamoto, T., Pointcheval, D.: REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 159\u2013175. Springer, Heidelberg (2001)"},{"key":"7_CR17","first-page":"99","volume-title":"ACM CCS\u201906","author":"M. Pirretti","year":"2006","unstructured":"Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure Attribute-Based Systems. In: ACM CCS\u201906, pp. 99\u2013112. ACM, New York (2006)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"key":"7_CR19","first-page":"2061","volume-title":"TrustCom\u201908","author":"N.D. Sarier","year":"2008","unstructured":"Sarier, N.D.: A New Biometric Identity Based Encryption Scheme. In: TrustCom\u201908, pp. 2061\u20132066. IEEE, Los Alamitos (2008)"},{"key":"7_CR20","volume-title":"EuroPKI\u201909","author":"N.D. Sarier","year":"2009","unstructured":"Sarier, N.D.: Biometric Identity Based Signature Revisited. In: EuroPKI\u201909. Springer, Heidelberg (2009) (to appear)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-02384-2_13","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"S.F. Shahandashti","year":"2009","unstructured":"Shahandashti, S.F., Safavi-Naini, R.: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. In: Preneel, B. (ed.) Progress in Cryptology \u2013 AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 198\u2013216. Springer, Heidelberg (2009)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-79104-1_5","volume-title":"Information Security Practice and Experience","author":"Q. Tang","year":"2008","unstructured":"Tang, Q., Bringer, J., Chabanne, H., Pointcheval, D.: A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol.\u00a04991, pp. 56\u201370. Springer, Heidelberg (2008)"},{"key":"7_CR23","unstructured":"van Liesdonk, P.P.: Anonymous and Fuzzy Identity-Based Encryption. Master\u2019s thesis, Technische Universiteit Eindhoven (2007)"},{"key":"7_CR24","unstructured":"Yang, P., Cao, Z., Dong, X.: Fuzzy Identity Based Signature. Cryptology ePrint Archive, Report 2008\/002 (2008), http:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T18:47:07Z","timestamp":1685558827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}